Reference Name: SAS Security Update for SAS® 9.4M8 (TS1M8)
Severity: Critical
History
- 1-23-2026 – New release available
- 10-01-2025 – New release available
- 7-07-2025 – New release available
- 9-27-2024 – New release available
- 6-28-2024 – New release available
- 12-14-2023 – New release available
- 10-2-2023 – New release available
- 6-30-2023 – SAS security update available
Description
The SAS security update for SAS 9.4M8 is a software update that addresses multiple third-party security vulnerabilities within the SAS® product suite. Security updates are cumulative, so you need to apply only the most recent update.
Solution
See SAS Security Updates and Hot Fixes to access the download and documentation for the SAS security update for SAS 9.4M8.
Vulnerabilities Addressed in the 1-23-2026 Release
Apache Tika
Apache Geode
Apache Tomcat
commons_lang
OWASP-esapi
POI
net.sf.ehcache:ehcache
- CVE-2025-49128
- CVE-2023-26049
- CVE-2023-26048
- CVE-2022-42004
- CVE-2022-42003
- CVE-2022-2047
- CVE-2021-34428
- CVE-2021-28165
- CVE-2020-36518
- CVE-2019-10247
- CVE-2019-10241
netty
org.apache.tiles:tiles-core
org.springframework
Vulnerabilities Addressed in the 10-01-2025 Release
Vulnerabilities Addressed in the 07-07-2025 Release
- CVE-2016-5003
- CVE-2019-17570
- CVE-2020-11971
- CVE-2022-40149
- CVE-2022-40150
- CVE-2022-40151
- CVE-2022-41966
- CVE-2022-45685
- CVE-2023-1370
- CVE-2023-1436
- CVE-2023-34620
- CVE-2023-38286
- CVE-2023-39685
- CVE-2023-52428
- CVE-2024-1597
- CVE-2024-22243
- CVE-2024-25638
- CVE-2024-29857
- CVE-2024-30171
- CVE-2024-30172
- CVE-2024-38808
- CVE-2024-38809
- CVE-2024-38816
- CVE-2024-38819
- CVE-2024-38820
- CVE-2024-38821
- CVE-2024-38827
- CVE-2024-38828
- CVE-2024-47072
- CVE-2024-47535
- CVE-2024-47554
- CVE-2025-23184
- CVE-2025-24813
- CVE-2025-24970
- CVE-2025-25193
Vulnerabilities Addressed in the 9-27-2024 Release
Vulnerabilities Addressed in the 6-28-2024 Release
Vulnerabilities Addressed in the 12-14-2023 Release
Vulnerabilities Addressed in the 10-2-2023 Release
- CVE-2023-35116
- CVE-2023-34478
- CVE-2023-34462
- CVE-2023-34034
- CVE-2023-24998
- CVE-2023-22602
- CVE-2023-20863
- CVE-2023-20862
- CVE-2023-20861
- CVE-2023-20860
- CVE-2022-45787
- CVE-2022-42889
- CVE-2022-42004
- CVE-2022-42003
- CVE-2022-40664
- CVE-2022-34870
- CVE-2022-31692
- CVE-2022-31690
- CVE-2022-26612
- CVE-2022-22978
- CVE-2022-22976
- CVE-2021-22119
- CVE-2021-22112
- CVE-2020-36518
- CVE-2018-8009
- CVE-2017-3162
- CVE-2017-15713
- CVE-2016-1000027
- CVE-2014-0229
- CVE-2012-4449
- CVE-2012-1574
Vulnerabilities Addressed in the 6-30-2023 Release
- CVE-2023-26049
- CVE-2023-26048
- CVE-2023-24998
- CVE-2022-42004
- CVE-2022-42003
- CVE-2022-41966
- CVE-2022-41854
- CVE-2022-40664
- CVE-2022-40152
- CVE-2022-40151
- CVE-2022-38752
- CVE-2022-38751
- CVE-2022-38750
- CVE-2022-38749
- CVE-2022-37023
- CVE-2022-37022
- CVE-2022-37021
- CVE-2022-34870
- CVE-2022-32532
- CVE-2022-25857
- CVE-2022-1471
- CVE-2021-46877
- CVE-2021-44531
- CVE-2021-43859
- CVE-2021-41303
- CVE-2021-34797
- CVE-2021-34428
- CVE-2020-36518
- CVE-2020-27223
- CVE-2020-27218
- CVE-2020-25649
- CVE-2020-2934
- CVE-2020-2933
- CVE-2020-2875
- CVE-2019-17638
- CVE-2019-17632
- CVE-2019-10173
- CVE-2019-2692
- CVE-2019-0222
- CVE-2018-11775
- CVE-2017-18640
- CVE-2017-7957
- CVE-2016-1000031
- CVE-2016-6810
- CVE-2016-3674
- CVE-2016-3092
- CVE-2016-3088
- CVE-2016-0782
- CVE-2016-0734
- CVE-2015-7559
- CVE-2015-6524
- CVE-2015-5254
- CVE-2015-1830
- CVE-2014-8110
- CVE-2014-3612
- CVE-2014-3600
- CVE-2014-3576
- CVE-2014-0050
- CVE-2013-7285
- CVE-2013-2186
- CVE-2013-1879
- CVE-2013-0248
- CVE-2012-6092